A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves (original) (raw)
Related papers
An Efficient and Secure Three-Pass Authenticated Key. Agreement Elliptic Curve Based Protocol
International journal of innovative computing, information & control: IJICIC
An Efficient Key Agreement Protocol for Secure Authentication
Lecture Notes in Computer Science, 2004
A new two-pass key agreement protocol
… and Human Science, …, 2003
Tree and elliptic curve based efficient and secure group key agreement protocol
Journal of Information Security and Applications, 2020
A New Security Model for Authenticated Key Agreement
Security and Cryptography for Networks, 2010
Vulnerability of two multiple-key agreement protocols
A New Efficient Protocol for Authenticated Key Agreement
International Journal of Computer and Communication Engineering, 2013
Cryptanalysis of an efficient three‐party password‐based key exchange scheme
2012
Secret Sharing-based Authenticated Key Agreement Protocol
The 16th International Conference on Availability, Reliability and Security, 2021
A New Secure Protocol for Authenticated Key Agreement
International Journal of Engineering and Technology, 2013
On the security of an efficient two-pass key agreement protocol
Computer Standards & Interfaces, 2004
A weakness in Sun-Chen-Hwang’s three-party key agreement protocols using passwords⋆
2004
The 2007 International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST 2007), 2007
On the security of a password-only authenticated three-party key exchange protocol
HPSR. 2005 Workshop on High Performance Switching and Routing, 2005., 2000
SECURITY AND PRIVACY, 2019
Improvement of modified authenticated key agreement protocol
Applied Mathematics and Computation, 2003
On the security of a simple three-party key exchange protocol without server's public keys
TheScientificWorldJournal, 2014
Efficient provably secure password-based explicit authenticated key agreement
Pervasive and Mobile Computing, 2015
An ID-based authenticated three-party key exchange protocol
ACCENTS Transactions on Information Security, 2017
International Journal of Network Management, 2014
International Journal of Network Security and …, 2010
Authenticated Key Agreement Protocols: A Comparative Study
Scientific Research Publishing
Cryptanalysis of simple three-party key exchange protocol
Computers & Security, 2008
An efficient certificateless two-party authenticated key agreement protocol
Computers & Mathematics with Applications, 2012
V International Enformatika …, 2005
Cryptanalysis of a Three-party Password-based Authenticated Key Exchange Protocol
Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences
Advances in Intelligent Systems and Computing, 2015
Implementing Network Security Protocols based on Elliptic Curve Cryptography
1999